Unix and Unix-derived systems like Linux and Mac OS X are vulnerable to these attacks since they use Bash as the default command shell. The FreeFlow Print Server (FFPS) includes the Solaris Operating System, which is potentially affected since it includes the Bash shell.

A document addressing this vulnerability and describing a tool for updating FreeFlow Print Server has been posted to the URL www.xerox.com/security.

Xerox Remote Services Security White Paper v1.0.10 (PDF 841.4K)July 08, 2014NOTE: This updated document describes the system components, interoperability, and features available for securing Xerox Remote Services within Xerox products. It is intended to serve as a guide for deploying Xerox Remote Services within a network environment.

Microsoft Windows XP End of Support: What You Need to Know V1.0 (PDF 90.6K)April 04, 2014IMPORTANT SUPPORT INFORMATIONThis document details the Xerox Products affected by both the End Of Life of Microsoft Windows XP on standalone Digital Front Ends (EFI FIERY AND CREO) and Microsoft Windows XPe (XP embedded) controllers on CF devices.

Xerox Remote Control User Interface Security White PaperJuly 10, 2013
This document describes the Remote User Interface use and Security Features available on the new Xerox ConnectKey devices. The latest edition may always be viewed here.

Xerox and Cisco Partnership Frequently Asked QuestionsMarch 05, 2012
Xerox has received questions about the partnership between Xerox and Cisco and the security features this will add to Xerox products. We have compiled these questions and answers into a document. It can be accessed here.

Xerox Secure Print (PDF 582K)April 05, 2011
Do you avoid printing private or confidential documents on workgroup devices? Now you can use Xerox® Secure Print to control the print timing of any document, without worrying about security.

Internal Hard Drive File Security for Phaser Printer Models (PDF 1.3M)June 23, 2010
This document details the types of data stored on the internal hard disk and describes how to use both the Secure File Overwrite feature and the Automatic File Deletion feature. It also contains instructions on setting security features. This document applies to a variety of Phaser models. For a complete list, see inside the document.

Xerox Secure Access Unified ID System (PDF 2.2M)April 16, 2010
This brochure describes how Xerox devices can use your existing access control magnetic or proximity cards to allow access to Print, Copy, Scan, and Fax. Gain flexibility with Follow-You printing while also saving user time. See how your unique ID card may be able to open more than the front door.

Xerox and the P2600 Security Working Group (PDF 359K)April 16, 2010
This document describes how Xerox has been working with the IEEE from the start to help author and comply with the P2600 Security specification. Now that the standards are written, see how this benefits our customers.

Use of CA-signed Digital Certificates for Better Security (PDF 38.6K)March 16, 2009
This document describes a solution to prevent exploit of a vulnerability in the MD5 algorithm that can affect WorkCentre® and WorkCentre Pro® devices. This vulnerability could allow attackers to create forged X.509 certificates to use in phishing attacks or impersonating legitimate sites.